<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS Traffic Accepted via Implied Rules in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Traffic-Accepted-via-Implied-Rules/m-p/264106#M44583</link>
    <description>&lt;P&gt;In addition, if someone wants to understand what is happening, I would suggest temporarily enabling logging for implied rules. When I first started working with Check Point, this was very useful for me.&lt;BR /&gt;&lt;A class="" href="https://support.checkpoint.com/results/sk/sk110218" target="_new" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk110218&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 02 Dec 2025 11:44:07 GMT</pubDate>
    <dc:creator>Vincent_Bacher</dc:creator>
    <dc:date>2025-12-02T11:44:07Z</dc:date>
    <item>
      <title>HTTPS Traffic Accepted via Implied Rules</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Traffic-Accepted-via-Implied-Rules/m-p/264085#M44576</link>
      <description>&lt;P&gt;Dear mates,&lt;/P&gt;
&lt;P&gt;The customer pointed out that a large amount of HTTPS traffic from external public IPs is being accepted by implied rules on the firewall. What could be the reason for this?&lt;/P&gt;
&lt;P&gt;Is there any implied rule that allows HTTPS by default?&lt;BR /&gt;And in which scenarios should this behavior be considered a concern?&lt;/P&gt;
&lt;P&gt;Thanks in advance, as always!&lt;/P&gt;</description>
      <pubDate>Tue, 02 Dec 2025 08:07:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Traffic-Accepted-via-Implied-Rules/m-p/264085#M44576</guid>
      <dc:creator>RemoteUser</dc:creator>
      <dc:date>2025-12-02T08:07:54Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Traffic Accepted via Implied Rules</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Traffic-Accepted-via-Implied-Rules/m-p/264088#M44577</link>
      <description>&lt;P&gt;There are several SK articles and previous threads here that describe this scenario e.g.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk105740" target="_self"&gt;sk105740: HTTP and HTTPS requests to external interfaces create implied rule 0 accepts in Logs &amp;amp; Monitor&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk180808" target="_self"&gt;sk180808: Security Gateway accepts HTTP/HTTPS traffic by an implied rule for its HTTP/HTTPS Web Portals, although there is an explicit rule to drop this HTTP/HTTPS traffic&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Dec 2025 08:36:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Traffic-Accepted-via-Implied-Rules/m-p/264088#M44577</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-12-02T08:36:57Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Traffic Accepted via Implied Rules</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Traffic-Accepted-via-Implied-Rules/m-p/264106#M44583</link>
      <description>&lt;P&gt;In addition, if someone wants to understand what is happening, I would suggest temporarily enabling logging for implied rules. When I first started working with Check Point, this was very useful for me.&lt;BR /&gt;&lt;A class="" href="https://support.checkpoint.com/results/sk/sk110218" target="_new" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk110218&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Dec 2025 11:44:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Traffic-Accepted-via-Implied-Rules/m-p/264106#M44583</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2025-12-02T11:44:07Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Traffic Accepted via Implied Rules</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Traffic-Accepted-via-Implied-Rules/m-p/264330#M44596</link>
      <description>&lt;P&gt;Hey brother,&lt;/P&gt;
&lt;P&gt;Apart what the guys said, which is all correct, here is what I would recommend. Create a geo block rule on top of the rule base to limit access from countries you wish to block, then below that, rule that allows access to the fw on whatever services needed. Thats how I do it with literally every customer. Then, down the rulebase, you can set up stealth rule, which is src any, dst fw, service any, action drop.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2025 01:01:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Traffic-Accepted-via-Implied-Rules/m-p/264330#M44596</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-04T01:01:33Z</dc:date>
    </item>
  </channel>
</rss>

